Access Controls

Access Controls

(ISC)²

About this course: Welcome to Access Controls!
The Access Controls Course provides information pertaining to specify what users are permitted to do, the resources they are allowed to access, and what operations they are able to perform on a system. Access Controls help managers limit and monitor systems use at a user level or group membership. You will understand the different access control systems and how they should be implemented to protect the system and data using the different levels of confidentiality, integrity, and availability.
The Access Controls course provides information pertaining to specifying what users are permitted to do, the resources they are allowed to access, and what operations they are able to perform on a system. Access Controls help managers limit and monitor systems use at a user level, and is usually predefined based on authority level or group membership. You will understand the different access control systems and how they should be implemented to protect the system and data using the different levels of confidentiality, integrity, and availability.
Objectives
1. Describe how to implement Authentication mechanisms
2. Identify and operate internetwork trust architectures
3. Describe the process of administering identity management life cycle
4. Implement the different types of access controls (Subject/Object based)

Module Topics: Identity Management, Authorization, Proofing, Provisioning, Maintenance, and Entitlement.
In Identity management, you will learn about identity management cycle. You will also learn about, authorization, proofing, provisioning, and maintenance.
In Entitlement, you will learn about entities, entitlement defined.

Video: Implement Access Controls: Rule-Set Based and Role-Based Access Control

Reading: Implement Access Controls: Rule-Set Based and Role-Based Access Control

Video: Implement Access Controls: Role Hierarchies

Reading: Implement Access Controls: Role Hierarchies

Video: Implement Access Controls: Restricted Interfaces

Reading: Implement Access Controls: Restricted Interfaces

Video: Implement Access Controls: key Terms

Reading: Implement Access Controls: Key Terms

Video: Implement Access Controls: Security Architecture and Models

Reading: Implement Access Controls: Security Architecture and Models

Video: Implement Access Controls: BLP and Biba Model Comparison

Reading: Implement Access Controls: BLP and Biba Model Comparison

Video: Implement Access Controls: BLP and Biba Model Comparison

Reading: Implement Access Controls: BLP and Biba Model Comparison

Graded: Quiz 5

WEEK 6

Case Study

This assignment is based on a case study that will require the student to put into practice the knowledge they have gained through the course. It requires the basic understanding of the topics and the ability to relate those topics to the real world. The objective of review is to determine whether the student has understood the concepts and has performed the necessary analysis to ensure a complete and thorough answer.

Graded: Peer Review: Access Controls Case Study

WEEK 7

Exam

1 reading

Reading: SSCP Exam Information

Graded: Access Controls Course Assessment

FAQs

How It Works

Coursework

Each course is like an interactive textbook, featuring pre-recorded videos, quizzes and projects.

Help from Your Peers

Connect with thousands of other learners and debate ideas, discuss course material,
and get help mastering concepts.

Certificates

Earn official recognition for your work, and share your success with friends,
colleagues, and employers.

Creators

(ISC)²

(ISC)² is an international nonprofit membership association focused on inspiring a safe and secure cyber world. Best known for the acclaimed Certified Information Systems Security Professional (CISSP®) certification, (ISC)2 offers a portfolio of credentials that are part of a holistic, programmatic approach to security. www.isc2.org